Access Control Protocol for Cloud Systems Based on the Model TOrBAC
Mustapha Ben Saidi1, Abderrahim Marzouk2

1Mustapha Ben Saidi. FST Settat University Hassan 1 Settat Departement of Mathematics and computers sciences Lab. MAI; Morocco.
2Abderrahim Marzouk. FST University Hassan 1er Settat Departement of Mathematics and computers sciences; Lab MAI Morocco.
Manuscript received on November 01, 2012. | Revised Manuscript received on November 02, 2012. | Manuscript published on November 05, 2012. | PP: 134-138 | Volume-2 Issue-5, November 2012. | Retrieval Number: E1027102512/2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The challenge that arises by the arrival of cloud computing is to carefully control the data that are no longer in possession of the company alone, but may be in the hands of third parties (TTP). Managing user trust is a major concern related to the management of migrated data in a Cloud. Dealing with this issue, our paper contributes to this process by defining a security policy based on trust, followed by the description of a security protocol for a TTP monitor attempts to violations of this policy by users of an organization’s cloud. This protocol is based on ordered policies established by the AS and assigned to each user during its connections to the cloud.
Keywords: Security, Cloud, Access Control, TOrBAC, OrBAC.